Experts detail a new Kimsuky social engineering campaign

North
Korea-linked
APT Kimsuky has
been
linked
to
a
social
engineering
campaign
aimed
at
experts
in
North
Korean
affairs.

Experts detail a new Kimsuky social engineering campaign

North
Korea-linked
APT Kimsuky has
been
linked
to
a
social
engineering
campaign
aimed
at
experts
in
North
Korean
affairs.

SentinelLabs
researchers
uncovered
a
social
engineering
campaign
by
the
North
Korea-linked
APT
group

Kimsuky

that
is
targeting
experts
in
North
Korean
affairs.
The
attacks
are
part
of
a
broader
campaign
recently
detailed
in
a

joint
advisory

published
by
US
intelligence.

The
campaign
has
the
objective
of
stealing
Google
and
subscription
credentials
of
a
reputable
news
and
analysis
service
focusing
on
North
Korea,
as
well
as
delivering
reconnaissance
malware.


Kimsuky cyberespionage
group 
(aka
ARCHIPELAGO,
Black
Banshee, Thallium,
Velvet
Chollima, APT43)
was
first spotted by
Kaspersky
researcher
in
2013.
At
the
end
of
October
2020,
the US-CERT
published
a
report
on
Kimusky’s
recent
activities
 that
provided
information
on
their
TTPs
and
infrastructure.

The
APT
group
mainly
targets
think
tanks
and
organizations
in
South
Korea,
other
victims
were
in
the
United
States,
Europe,
and
Russia.

In
the
latest
Kimsuky
campaign,
the
state-sponsored
group
focused
on
nuclear
agendas
between
China
and
North
Korea,
relevant
to
the
ongoing
war
between
Russia
and
Ukraine.

Threat
actors
engage
in
extensive
email
correspondence
with
the
victims
and
use
spoofed
URLs,
websites
mimicking
legitimate
web
platforms,
and
weaponized
documents.

The
attackers
were
spotted
delivering
the
recently
discovered
reconnaissance
tool

ReconShark

malware.

The
campaign
focuses
on
the
theft
of
email
credentials
and
NK
News
subscription
credentials.

SentinelLabs
attributes
the
campaign
to
Kimsuky
based
on
the
type
of
malware
used,
the
attack
infrastructure,
and
TTPs.


“A
hallmark
of
the
activity
we
discuss
in
this
post
is
Kimsuky’s
focus
on
establishing
initial
contact
and
developing
a
rapport
with
their
targets
prior
to
initiating
malicious
activities.
As
part
of
their
initial
contact
strategy,
the
group
impersonated
Chad
O’Carroll,
the
founder
of
NK
News
and
the
associated
holding
company
Korea
Risk
Group,
using
an
attacker-created
domain,
nknews[.]pro,
which
closely
resembles
the
legitimate
NK
News
domain
nknews.org.”
reads
the
report
published
by
SentinelOne
“The
initial
email
requests
the
review
of
a
draft
article
analyzing
the
nuclear
threat
posed
by
North
Korea.”

The
researchers
observed
Kimsuky
sending
an
HTML-formatted
spear
phishing
message
which
requests
them
to
review
a
draft
analysis
of
the
nuclear
threat
posed
by
North
Korea.
The
email
is
crafted
to
stimulate
a
subsequent
conversation
with
the
recipient,
it
impersonates
NK
News
leadership
and
lacks
any
malicious
artifacts.


Upon
engaging
the
target
in
the
conversation,
the
APT
group
eventually
follows
up
with
an
email
that
contains
an
URL
to
a
Google
document.

In
case
the
recipient
is
not
responsive,
the
nation-state
actors
follow
up
with
a
reminder
email
in
an
attempt
to
engage
the
target
in
conversation.

The
attackers
spoofed
the
URL’s
destination
by
setting
the

href
 HTML
property to
direct
to
a
website
under
the
control
of
the
attackers.

The
displayed
URL
points
to
a
document
hosted
on
Google
Docs,
delving
into
the
topic
of
the
North
Korean
nuclear
threat.
The
article
contains
visible
edits
to
give
the
impression
of
a
genuine
draft
article.

The
spoofed
destination
of
the
URL
redirects
the
victim
to
a
Kimsuky’s
website
that
masquerades
as
a
legitimate
Google
Docs
site
for
requesting
document
access,
such
as

https[://]drive-google[.]shanumedia[.]com/pdf/ul/ji78fghJHKtgfLKJIO/s2.php?menu=ZGFu[...]vbQ==

The
URL
includes
a
Base-64
encoded
segment
that
is
the
value
of
the

menu
 URL
query
parameter,
which
resolves
to
the
victim’s
email
address.

The
email
address
is
displayed
in
the
fake
login
page
to
trick
the
visitor
into
thinking
that
is
is
a
legitimate
page
of
access
request.

The
researchers
also
observed
threat
actors
distributing
password-protected
weaponized
Office
documents
during
conversations
with
the
victims.
The
archive
was
used
to
deploy
the
ReconShark
reconnaissance
tool.


“SentinelLabs
remains
actively
engaged
in
monitoring
the
activities
conducted
by
Kimsuky.
The
findings
presented
in
this
post
highlight
the
group’s
persistent
commitment
to
targeted
social
engineering
attacks
and
underscore
the
need
for
increased
awareness
and
understanding
of
Kimsuky’s
tactics
among
potential
targets.”
concludes
the
report.
“Maintaining
vigilance
and
implementing
effective
security
measures
are
imperative
to
mitigate
the
risks
posed
by
this
persistent
threat
actor.”

Follow
me
on
Twitter: @securityaffairs and Facebook and Mastodon



Pierluigi Paganini


(
SecurityAffairs – hacking, Kimsuky)




About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.